scholarly journals Analysys and Implementation IEEE 802.1Q to Improve Network Security

Author(s):  
Muhammad Syaeful Bahry ◽  
Bambang Sugiantoro

The development of technology today is very fast one only with the existence of the use of the computer network. This can be seen in the increasing number of organizations or companies that use the computer network to facilitate the flow of information within the organization or the company. But with the abundance of the use of network technology is only advancing network progressed only, but not maximize resource so that sometimes allows for the problem or traffic network. For that can be needed by network development solution made VLAN topology using NDLC method (Network Development Life Cycle). Vlans are able to improve the capabilities of the network and can reduce the amount of data that is sent to a destination that does not need to be so that the traffic in the network will be reduced by itself. In addition there is another reason why requires a VLAN is to reduce the possibility of the misuse of access rights. It can use the Mode Access. With the Mode will divide each Host into the VLAN each. With the existence of a VLAN shows can increase network ability as much as 13.4 %. With the data shows that a VLAN successful and able to make the network more efficient. In the VLAN network security aspect is able to optimize network security with the existence of access mode, so that the new host are not capable of entering it into the existing network topology.

2014 ◽  
Vol 1044-1045 ◽  
pp. 1298-1301
Author(s):  
Qian Wu

Early network development, people more emphasis on network convenience and availability, and ignore the security of the network. With the development of computer network technology, when people run in the network critical business such as banking, when government activity is increasingly networked, computer network security has become a problem that not allows to ignore. In this paper, the existing network security technology to prevent the analysis and comparison, especially to strengthen security measures should be taken in order to do a more in-depth discussion, and describes the future development trend of this research field.


2013 ◽  
Vol 433-435 ◽  
pp. 1720-1723
Author(s):  
Jun Ruan ◽  
Pan Zhang ◽  
Hong Bi Ding

With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.


Author(s):  
Kurniati Kurniati ◽  
Rahmat Novrianda Dasmen

PT. KAI Palembang is a branch of PT. Kereta Api Indonesia (KAI) Persero located in South Sumatra Province, where PT. KAI Persero is an Indonesian State-Owned Enterprise that organizes railway transportation which provide services including passenger and goods transportation. PT. KAI Palembang has a computer network connected to PT. KAI Persero central is located in Jakarta. Now, PT. KAI Palembang is trying to improve computer network security, where one of them is limiting the access of users who connected to PT. KAI Palembang computer network. This can be done by implementing Access Control Lists (ACLs) and Frame Relay on PT. KAI Palembang computer network. In this research used the Network Development Life Cycle (NDLC) method which has several stages, namely Analysis, Design, Simulation Prototyping, Implementation, Monitoring and Management. This research method is used because the results of this research will be displayed in the Cisco packet tracer simulator. In addition, the results of this research were tested using a ping test between computers to show that the ACLs design had been running well.  


2010 ◽  
Vol 108-111 ◽  
pp. 168-171 ◽  
Author(s):  
Hong Yun Xu

With the rapid development of network technology, computer network applications in the financial system is becoming increasingly popular, the financial network security issues become increasingly prominent. This paper through the analysis of various risks faced by current financial networks, proposes the design principles of financial network security architecture and the design goals of financial network security architecture, finally gives the design patterns of financial network security architecture.


2014 ◽  
Vol 513-517 ◽  
pp. 2182-2185
Author(s):  
Yi Jun Bai

With the general progress of information technology, the computer & network technology are generally applied in the tax system of which it will make more rooms for the tax administration and services in implementing the electronization, networking, transparency and efficiency developments. Meanwhile, the computer & network security issues become more prominent and significant in the e-tax system. In the paper, the author puts forward the corresponding solutions and measures by analyzing the network risks of the e-tax applications from the technical and management points.


Author(s):  
Siti Aisyah

Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.


2013 ◽  
Vol 718-720 ◽  
pp. 2120-2124
Author(s):  
Fan Zhang ◽  
Xing Ming Zhang ◽  
Ke Song

New threats to and requirements of security come forth endlessly while the network technology progresses continually. Security equipment has little adaptive capacity in the existing rigid network. It has bad influence on network security in Mainland China. A reconfigurable security component is designed in this paper. It can fit the coming requirements of network development in the future. A prototype of this security component is implemented and analyzed.


2014 ◽  
Vol 687-691 ◽  
pp. 2007-2010
Author(s):  
Xiao Ru Sun

With the rapid development and application of the computer network technology, computer network system has brought many unsafe hidden dangers to the user. The computer network security has got more and more attentions of people. Therefore, this paper analyzes the main problems in computer network security and proposes some effective preventive measures. The author hopes these will help the computer network plays better role for people.


2014 ◽  
Vol 1079-1080 ◽  
pp. 595-597
Author(s):  
Jian Hang Wang ◽  
Hai Bo Wang

Development of computer network technology has greatly improved the sharing rate and utilization of information resources, many areas are widely used local area network, widely used degree gradually expose their security and confidentiality issues. In particular, people lack knowledge on security policy and network security control mechanisms, leading network security becomes more complex. In this paper, the main problem with the current computer Local Area Network security and the starting point, the focus of the analysis and management of their security and confidentiality measures, hope to further enhance the computer LAN security.


Sign in / Sign up

Export Citation Format

Share Document